
Security
check_ipsec
Description:
Check ipsec connections from openswan or strongswan
Current Version
Last Release Date
June 18, 2009
Compatible With
Owner
Project Files
File | Description |
---|---|
check_ipsec | check_ipsec |
Project Notes
Checks vpn connection status of an openswan or strongswan installation.
Usage: check_ipsec --tunnels
./check_ipsec --tunnels 10
OK - All 10 tunnels are up an running
You have to run this plugin with nrpe.
Add these lines to /etc/sudoers:
Cmnd_Alias IPSEC = /usr/lib/nagios/plugins/check_ipsec
nagios ALL=NOPASSWD:IPSEC
Reviews
(1)
Add a Review
Core pre-req requirement not mentioned:
FPING
Ubuntu16 instance had to modify the FPING path to usrinfping (not usrsbinfping)
Also had to modify the grep string check for the latest strongSwan tunnel check:
ORIGINAL: tunneltest=`$IPSECBIN status | grep -e "IPsec SA established" | grep -e "newest IPSEC" |grep -e $CONN | wc -l`
UPDATED: tunneltest=`$IPSECBIN status | grep -e "ESTABLISHED" | wc -l`
Suggest using full path in GATEWAYLIST variable instead of relative path and just a filename.
Works effectively once tweaked for the deployed environment.
FPING
Ubuntu16 instance had to modify the FPING path to usrinfping (not usrsbinfping)
Also had to modify the grep string check for the latest strongSwan tunnel check:
ORIGINAL: tunneltest=`$IPSECBIN status | grep -e "IPsec SA established" | grep -e "newest IPSEC" |grep -e $CONN | wc -l`
UPDATED: tunneltest=`$IPSECBIN status | grep -e "ESTABLISHED" | wc -l`
Suggest using full path in GATEWAYLIST variable instead of relative path and just a filename.
Works effectively once tweaked for the deployed environment.
Page Sections
Project Stats
Rating
3 (1)
Favorites
1
Views
114,142